[go: up one dir, main page]

WO1997028649A1 - Scrambling of digital media objects in connection with transmission and storage - Google Patents

Scrambling of digital media objects in connection with transmission and storage Download PDF

Info

Publication number
WO1997028649A1
WO1997028649A1 PCT/FI1997/000045 FI9700045W WO9728649A1 WO 1997028649 A1 WO1997028649 A1 WO 1997028649A1 FI 9700045 W FI9700045 W FI 9700045W WO 9728649 A1 WO9728649 A1 WO 9728649A1
Authority
WO
WIPO (PCT)
Prior art keywords
format
scrambled
storage
time
reproduction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/FI1997/000045
Other languages
French (fr)
Inventor
Ari Salomäki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Oyj
Original Assignee
Nokia Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Oyj filed Critical Nokia Oyj
Priority to AU15482/97A priority Critical patent/AU1548297A/en
Priority to US09/117,221 priority patent/US6222924B1/en
Priority to DE69720421T priority patent/DE69720421T2/en
Priority to EP97901648A priority patent/EP0878096B1/en
Priority to JP9527329A priority patent/JP2000504169A/en
Publication of WO1997028649A1 publication Critical patent/WO1997028649A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/163Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Definitions

  • the invention relates in general to the protection of digital sound and picture objects against unauthorized reception and copying and in particular to how the protection against unauthorized reception and copying can be implemented in a uniform manner as regards broadcasting, local storage and the selling and distribution of recordings to consumers.
  • An object may be a picture, sound effect, piece of music, film, animated program, radio program, multimedia program or other corresponding entity which can be transmitted, stored and reproduced to a user as such and/or together with other corresponding objects.
  • transmission it is meant especially broadcasting, where a transmitting station electrically distributes objects to a great number of receivers on a regular basis.
  • storing it is meant that the object or a period extracted from it is rendered into a form from which it can be later decoded to be reproduced to a user several times if required.
  • Computer programs can also be considered some kind of objects, even though they are not in the same way meant to be broadcast.
  • Multimedia and interactive mass media becoming more popular the boundary between the computer program as we know it and the radio or TV program, whether it is meant to be entertaining or educational, will become blurred.
  • the digital audio broadcasting (DAB) system provides for transmitting objects that are broadcast in file format and loaded in the storage media of the receiving equipment to be later interactively reproduced to a user so that the user will have the opportunity to change the flow of the program.
  • Scrambling and descrambling methods and devices according to the prior art are usually characterized in that they are channel specific which means the scrambling is directed to a particular transmission stream always in the same way regardless of what objects the transmission stream contains.
  • the only options are switching the scrambling on and off, if e.g. a pay TV channel wants to send a particular film or program unscrambled so that it can be viewed by a larger audience.
  • Copyrights are always directed to individual objects and, therefore, methods accord ⁇ ing to the prior art cannot implement a pay system where the producers of objects acquired from different sources could be remunerated in any other way than if the transmitting station pays for the right to broadcast a particular object in its distribution network or coverage area.
  • Arrangements according to the prior art are also characterized in that a receiver who has at his disposal a descrambling device can without limitation store, duplicate and further distribute a particular object after having descrambled it. To safeguard the rights of parties producing objects and their transmission and distribution services it is essential that users could be obliged to pay a separate recompense for storing and duplicating an object.
  • a fixed key device or a so-called hardlock, which usually comprises an electric circuit cast in a plastic housing that has to be inserted in the communications port of the computer for the program to be usable.
  • a hardlock which usually comprises an electric circuit cast in a plastic housing that has to be inserted in the communications port of the computer for the program to be usable.
  • a further object ofthe invention is that the method according to it be applicable to known digital transmission and storing arrangements.
  • the objects of the invention are achieved by defining general, standardized scrambl ⁇ ing data formats to be applied in the broadcasting and storage of digital data, using different scrambling data formats for storing and broadcasting.
  • the achievement of the objects of the invention can be further advanced by adding to the user's de ⁇ scrambling device a real time clock, combining a real time code to the digital broadcast format and by combining the payment transactions corresponding to the descrambling rights to the distribution of descrambling keys.
  • the method according to the invention for protecting digital media objects against unauthorized use, which objects can be electrically distributed to several receivers and stored on a memory medium for later use, wherein a scrambled broadcast format is specified for said media objects, is characterized in that a scrambled storage format is also specified for said media objects for the storing on said memory medium, which scrambled storage format is different from said scrambled broadcast format.
  • the invention is also directed to terminal equipment for receiving, storing and reproducing digital media objects to a user, said terminal equipment comprising means for descrambling the scrambled broadcast format.
  • the terminal equipment according to the mvention is characterized in that it further includes means for storing a received media object in a scrambled storage format which is different from said scrambled broadcast format.
  • the invention implies that a common international agreement or standard can define different scrambled formats or identification procedures for digital media objects according to whether they are being transmitted or stored. In addition, different formats or identification procedures can be specified for an object according to whether it is the original version (produced by the copyright owner) or a copy produced by someone else.
  • Devices handling digital media objects are manufactured such that they can reproduce a received or stored object only if they have at their disposal the key that authorizes the reproduction ofthe object in question. Further- more, in an advantageous embodiment of the invention, the devices will not store broadcast-format objects but will first convert them into the storage format. Objects are advantageously handled as constant-size data parts, or frames, so that the dif ⁇ ference between the broadcast format and storage format may be as small as a change of one bit or bit combination in the frame header part or other data structure describing the contents of the packet.
  • the scrambling method according to the invention further comprises a timing ar ⁇ rangement wherein the objects transmitted are time-stamped, ie. provided with data representing the transmission moment. Then, even if an object were stored in the broadcast format, its unauthorized reproduction at a later time can be prevented if the reproducing device first has to compare the stored time data to the real time. If the times are unidentical, reproduction is prohibited.
  • the timing arrangement is based on an electrical memory medium which is advantageously a smart card or such. Below, this portable memory medium will be called a smart card.
  • the smart card includes a real time clock, which refers to any circuit in general which, when read at an arbitrary moment of time, unequivocally yields the data representing the time of the reading.
  • each object is arranged both for trans ⁇ mission and storage into data parts that can be called frames, packets, cells or data groups and that are formatted according to existing standards and recommendations describing data transmission and/or storage. At least part ofthe frames and data groups are provided with a time stamp which in the case of broadcasting refers to the time of transmission and in the case of storage to the time of storing.
  • an object to be transmitted or distributed as an original recording (such as a CD) are scrambled using a known method where descrambling requires a certain cipher key which advantageously is a relatively big binary number.
  • a user may purchase the right to use the object in question so that when he pays a certain sum of money, the necessary key or keys will be loaded into his smart card.
  • a key may be valid for a fixed or an indefinite period of time.
  • the user pays a different sum according to whether he uses the object just once (real time use) or stores (copies) it to be used later and possibly several times. 'Using' here means broadly viewing, listening to or otherwise exploiting the object. Because ofthe different prices for the real time use and storage the keys stored in the smart card have to be different for the different purposes of use.
  • Fig. 1 shows one phase in the application of the method according to the invention
  • Fig. 2 shows as a series of pictures other phases in the application of the method according to the invention
  • Fig. 3 shows an alternative way of applying the method according to the invention
  • Fig. 4 shows another alternative way of applying the method according to the invention.
  • the invention provides for the broadcasting of digital objects, it will be first described the essential features of the digital audio broadcasting (DAB) system used here as an illustrative application.
  • DAB digital audio broadcasting
  • the information in an audio transmission and in a data transmission in general is transported in constant-size data parts that in the case of an audio transmission are called audio frames and in the case of a data transmission data groups.
  • Each audio frame and data group includes a header part containing records or fields describing its contents, and a payload part that contains the actual data to be transmitted.
  • the DAB system specifies in the way known to one skilled in the art data structures that are used for transferring both frame-specific and more general control information from the transmitting to the receiving device.
  • FOG fast information groups
  • FAC fast information channel
  • PAD frame-specific program associated data
  • Scrambling means changing the audio data such that the sound contained in it cannot be reproduced without knowing a certain key.
  • Said key is a number which, when fed as a seed to a certain generator producing pseudo-random numbers, produces a pseudo-random bit sequence corresponding to the key in question.
  • a logical XOR (exclusive-OR) operation executed between the bit sequence and the scrambled audio data produces reproducable audio data. This operation opposite to scrambling is called descrambling.
  • the key which is given to the user, may be clear (known) or encrypted; in the latter case, the encrypted key must first be decrypted. There exist several arrangements to implement the encryption of the key and we will return to them later on. This paragraph refers to the fact that the audio frame specific data in the DAB system indicate whether the frame in question is scrambled using a known or an encrypted key.
  • conditional access system which includes several specifications related to the access rights of services.
  • Known conditional access systems include Eurocrypt and NR- MSK, among others.
  • the conditional access system applied can be indicated for each frame.
  • a time stamp referring to the date and/or time of day can be included in the frames so that it corresponds to the time of transmission.
  • Frames can include identification information which identifies the object transmitted and e.g. the party that produced the object and is the holder of the copyright of the object. If) encrypted key
  • a scrambling key is valid for a few frames only.
  • a so-called initialization, or reset can be performed between those frames, too, resetting the pseudo-random bit sequence generator used in the descrambling so that possible errors in the long bit sequence be less harmful.
  • the initial ⁇ ization modifiers define how the generator will be initialized.
  • the DAB system specifies the following data group specific information and its transmission along with a scrambled data transmission:
  • the DAB recommendations specify file-specific transmission as regards the following information:
  • Stored frames related to a particular object are consecutively numbered.
  • the proposed 24-bit numbering field can be used to identify 2 ⁇ 4 frames. If each frame corresponds, according to the DAB standard, to a 24-millisecond play ⁇ back period, the maximum duration of the stored object is about 4 l ⁇ days.
  • the consecutive numbering of frames is advantageous especially in operations such as fast rewind, fast forward and search.
  • flag bit value 1 refers to an original and 0 to a copy.
  • a storing (copying) device has to be built such that it sets the frame-specific flag bit to 0.
  • table 1 scrambled audio object
  • One flag bit indicates whether the frame in question is scrambled or not. Inside a scrambled object there may be unscrambled frames, so it is advantageous to have a frame-specific scrambling indication.
  • Flag bit value 1 corresponds to a clear key and value 0 to an encrypted key.
  • This field is divided into two subfields: * storage medium identifier, 4 bits, e.g. as in the table below (rest ofthe bit combinations are reserved for future expansion)
  • remote storage e.g. in local area network
  • this field advantageously starts with 5 padding bits which are all ones. They are followed by a 32-byte (256-bit) authorization data field which can contain information depending on the conditional access system used, such as the service provider identification code, program identification code and program classification.
  • the two-key arrangement gives to the receiving or reproducing device time to decrypt the next encrypted key.
  • the new key becomes the current key and the next key becomes the new key.
  • the real length ofthe key depends on the scrambling system used and on the encryption method of the key, so the 80 bits mentioned here is just the maximum length.
  • the storage format is not tied to any particular audio frame structure, it is advantageous to indicate in the stored frame data the standard with which the frame complies.
  • the frame may be e.g. an ISO/LEC 11172-3 Layer II or Layer III frame in accordance with the motion picture experts group (MPEG) standards or a DAB audio frame.
  • MPEG motion picture experts group
  • 3m hash sum for 3a to 31, 88 bits
  • the fields described above in 3a to 31 are advantageously left unscrambled so that they can be read as quickly as possible in connection with reception and/or playback. However, they have to be somehow protected against un ⁇ authorized modification.
  • a so-called hash algo ⁇ rithm is used in a known manner, said algorithm being identified by the 8 first bits in the 3m field and used to calculate a certain 80-bit result on the basis of the bit contents of said fields.
  • the length of the audio frame In the beginning of the frame there is a 16-bit length subfield indicating the length of the audio frame in bytes.
  • the length of the frame depends on the encoding method, level of compression and possible ancillary data (program associated data, PAD, in the DAB). Inclusion of the length information in the beginning of the frame helps operations such as fast rewind, fast forward and search.
  • Data groups related to a particular file are consecutively numbered.
  • the data groups can be called blocks or segments.
  • the consecutive numbering is advantageous especially in operations such fast rewind, fast forward and search.
  • Said real time clock is advantageously located in the smart card because then its unauthorized changing can be prevented in the same known way as the changing of other information in the smart card. Furthermore, it can be required that when a user presents his smart card to an authorized dealer for new keys to be loaded in it in the manner described later on, the new keys will not be loaded if the clock in the smart card has been tampered with. If the time stamps are made, as proposed above, at the accuracy of one day, there follows that, first, the real time clock need not be readable at a greater accuracy than that and, second, objects stored in the broadcast format can be freely used during that one day. If a stricter time control is to be applied, then more bits will have to be reserved in the frames and data groups for the time stamp.
  • the smart card has to be provided with a power supply, which is advantageously a small rechargeable battery that can be charged always when the smart card is connected to a receiver and/or playback device.
  • a power supply which is advantageously a small rechargeable battery that can be charged always when the smart card is connected to a receiver and/or playback device.
  • the real time clock is advantageously set in a shut-down state where its operation is pro ⁇ hibited, and it can be made operational again only by an authorized dealer at an authorized shop or through a secure two-way telecommunications link.
  • the secret information needed for the removal of the shut-down state is advantageously stored in the permanent memory ofthe smart card when the card is delivered to the user.
  • a similar operation by an authorized dealer is required if the real time clock in the smart card has to be set to a new time, e.g. when crossing time zones, if the system does not use a certain standard time (such as the Greenwich Mean Time, GMT) in all its operations.
  • a device for an ordinary user which receives and/or reproduces digital objects can read and display to the user the time shown by the real time clock in the smart card but it cannot change it without authorization from an authorized dealer.
  • Figs. 1 to 4 it will be now described the selling and transferring of various rights and corresponding keys in the system according to the invention enabling payments to the parties who own the rights related to the objects and/or their broadcasting.
  • the parties are the publisher (PUB; also content provider), broadcaster (BR; also service provider) and the user (U) of the object.
  • the encircled numbers in the drawing represent one possible mutual order of the various steps, without limiting the invention, though.
  • a user U buys from a representative of a publisher PUB a record CD which contains the desired object.
  • the publisher has manu ⁇ factured the record in such a way that the data is in scrambled form (S) and the keys needed for descrambling, which are included in the frames of the record (3j and 4j above), are encrypted.
  • the price of the record corresponds to the manufacturing and transportation costs and does not include the charge for the right of use of the contents of the record.
  • the key needed for decrypting the encrypted keys is called an authorization and is marked Al . By paying the appropriate sum $ the user gets the authorization.
  • a publisher PUB produces a record CD in scrambled form (S) and attaches to it the encrypted keys.
  • An authorization Al is needed for decrypting the keys.
  • a user U pays to the publisher PUB both the price of the record CD and the charge $ for the right of use of the contents of the record.
  • the publisher PUB gives to the user U the authorization Al needed for the decrypting by storing it in the user's smart card SC.
  • the user inserts the smart card SC and the record CD in a playback device (not shown) which then uses the authorization Al to decrypt the keys and descrambles (US) the stored object while reproducing the object to the user.
  • a playback device not shown
  • the authorization Al may be different and have different prices according to whether it entitles the user U only to use the stored object or also to copy it.
  • the authorization may be publisher-specific, covering all products of a particular pub ⁇ lisher, in which case the identification information related to the object in question has to be stored in the smart card SC in addition to the authorization. If the user later buys another product from the same publisher, the authorization need not be loaded again in the smart card but only the identification information of the new product.
  • a user U acquires from a publisher PUB the right to use objects produced by said publisher and transmitted by a broadcaster BR.
  • the idea is that a publisher-specific authorization Al and a certain amount of money are loaded in the user's smart card SC against a certain payment $.
  • the publisher PUB transfers an object to the broadcaster BR so that the object is already scrambled (S) and its scrambling keys are encrypted and require an authorization Al .
  • the broad ⁇ caster broadcasts the object in question, which is then received and descrambled (US) by a device of the user U using the authorization Al .
  • the events in Fig. 2, in the order of their occurrence, are as follows:
  • a user U pays to a publisher PUB a publisher-specific license fee $.
  • CD The publisher PUB gives an authorization Al needed in the decrypting to the user U by storing it in the user's smart card SC. At the same time, a certain amount of "electronic money" $$$ is loaded in the smart card.
  • the publisher transfers a scrambled (S) object to a broadcaster BR and attaches to it the encrypted keys.
  • An authorization Al is needed to decrypt the keys.
  • the broadcaster BR broadcasts the object.
  • the user inserts the smart card SC in a receiver and playback device (not shown) which then uses the authorization Al to decrypt the keys and descrambles (US) the received object while reproducing the object to the user. At the same time, certain amount of electronic money in the smart card SC is marked spent.
  • Electronic money loaded in the smart card is marked spent in proportion as the user receives and uses broadcast objects.
  • the amount marked spent advantageously de ⁇ pends on whether the user just reproduces the received object or stores it for later use.
  • the identification information needed for identifying a certain object and the prices corresponding to the different purposes of use are broadcasted along with the object.
  • Fig 3. depicts a situation where a broadcaster BR purchases objects from a publisher PUB and distributes them free of charge to users U.
  • the situation is otherwise the same as in Fig. 2, but the payments are made between the publisher PUB and the broadcaster BR, and the broadcaster BR gets the authorization Al needed for the decryption.
  • the broadcaster descrambles (US) the object and broadcasts it either entirely unscrambled or scrambled with unencrypted keys which the receiving device can read direct from the broadcast (cf. 3e and 4e above). Then, no money is marked spent in the user's smart card and, indeed, the user has no need for any authorization for which he should pay.
  • a smart card may contain either "common money", meaning that an amount of money loaded in the smart card can be used for paying any charges to anyone, or money marked for a certain purpose.
  • common money could be used for paying for objects from any publisher, whereas money marked for a certain purpose, ie. for a single publisher. could only be used for paying for objects coming from that particular publisher.
  • pubi.sher gets the money already in connection with the loading ofthe authorization, and there will be no confusion about what has been paid, to whom and for what services.
  • the embodiment of the invention described above, referring to Fig. 2, has the disadvantage that if a user has not acquired a publisher-specific authorization Al, he cannot use any objects from that particular publisher PUB broadcasted scrambled by a broadcaster BR.
  • This disadvantage can be eliminated by an alternative embodi- ment according to Fig. 4 wherein a user U pays $ for a broadcaster-specific author ⁇ ization A2 and loads in his smart card electronic money marked for that broadcaster BR.
  • a publisher PUB transfers an object to the broadcaster BR so that the object is scrambled (S) and its scrambling keys are encrypted and require an authorization Al .
  • the broadcaster BR decrypts the keys and descrambles (US) the object but then scrambles (S) the object again so that the new scrambling keys are encrypted and require an authorization A2.
  • the broadcaster broadcasts the object which is then received and descrambled (US) by a device of the user U using the authorization A2.
  • the user's smart card SC divides the broadcaster-specific amount of money into publisher accounts and charges the accounts according to the use (direct use, storing, copying) of the objects. Later the user takes his smart card to be read by the broadcaster, publisher or an authorized dealer, where the accounts are read and the broadcaster then has to pay the corresponding sums to the publishers.
  • the smart card can also be read at the user's home through a secure two-way communications link. To motivate the user to have his card read, the authorizations can be arranged so that the user cannot later use a stored object before the respective accounts in the smart card have been settled.
  • a publisher PUB and a broadcaster BR agree on broadcasting and the publisher PUB gives to the broadcaster BR an authorization Al needed for decryption.
  • a user U pays to the broadcaster BR a broadcaster-specific license fee $.
  • the broadcaster gives to the user U an authorization A2 needed for decryption by storing it in the user's smart card SC. At the same time, a certain amount of "electronic money" is loaded in the smart card.
  • the publisher PUB delivers an object in a scrambled form (S) to the broadcaster and attaches to it the encrypted keys.
  • An authorization Al is needed to decrypt the keys.
  • the broadcaster BR uses authorization Al to decrypt the scrambling keys and descrambles (US) the received object but then scrambles (S) it again so that authorization A2 is needed for the decryption. The broadcaster then broadcasts the object.
  • the user inserts the smart card SC in a receiver and playback device (not shown) which then uses authorization A2 to decrypt the scrambling keys and descrambles (US) the received object while reproducing the object to the user. At the same time, certain amount of electronic money in the smart card SC is marked spent.
  • the user has his smart card SC read, and the broadcaster BR pays license fees to the pushlisher PUB on the basis of the data in the smart card.
  • All above-mentioned authorizations loaded in the user's smart card can be valid for a fixed period of time or until further notice.
  • the real time clock in the smart card is useful in the implementation of the fixed-period feature because then the receiver and playback devices need not have a clock. It is also more difficult to tamper with a clock in the smart card than with a clock in a certain device.
  • the reception and use of an object are recorded in the smart card, it can be so arranged that by presenting his smart card to an authorized dealer the user is able to show that he has already paid for the use of the object and can then have the original record for a small extra charge as in Fig. 1.
  • a terminal equipment has to include means for receiving and de ⁇ scrambling a transmission scrambled using a known method and for decrypting the scrambling keys by means of an authorization stored on a memory medium.
  • a storing terminal equipment has to include means for producing the storage format described above in the storing phase, and for reading it in the play ⁇ back phase.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

To prevent unauthorized reception, storage, copying and reproduction of digital media objects, it is defined in addition to a scrambled broadcast format a scrambled storage format which is different from the broadcast format. A user's terminal equipment cannot receive, store or reproduce protected objects without a key which is advantageously a bit sequence stored on a portable memory medium and which can be different according to the type of use it gives entitlement to. To prevent the storing and later reproduction as such of data in the broadcast format, a time stamp is included in the broadcast format representing the time of broadcasting. A playback device cannot reproduce a broadcast-format object if the reproduction time differs from the time stamp included in the broadcast format. The reproduction time is advantageously read from a real time clock of a portable memory medium.

Description

Scrambling of digital media objects in connection with transmission and storage
The invention relates in general to the protection of digital sound and picture objects against unauthorized reception and copying and in particular to how the protection against unauthorized reception and copying can be implemented in a uniform manner as regards broadcasting, local storage and the selling and distribution of recordings to consumers.
Electrical transmission and storage of programs and presentations including images and/or sound has shifted or is shifting from analog to digital technology, the ad¬ vantages ofthe latter being lower susceptibility to spurious effects and versatile error correction possibilities. The quality of a digital image and sound will not deteriorate in transmission, reception and storage in the same way as it does when using analog technology. Digital technology is already being widely used in the sales and distribution of audio and data recordings in the form of compact discs, or CDs. Computers apply digital magnetic storing of data in their mass memory units and digital broadcasting systems are in pilot stages. We can assume that in the future both the capacity and the exploitation of data transmission and storage will continue to increase.
Below, all digital sound and image recordings and transmissions handled as one entity will be called simply objects. An object may be a picture, sound effect, piece of music, film, animated program, radio program, multimedia program or other corresponding entity which can be transmitted, stored and reproduced to a user as such and/or together with other corresponding objects. By transmission it is meant especially broadcasting, where a transmitting station electrically distributes objects to a great number of receivers on a regular basis. By storing it is meant that the object or a period extracted from it is rendered into a form from which it can be later decoded to be reproduced to a user several times if required.
Computer programs can also be considered some kind of objects, even though they are not in the same way meant to be broadcast. Multimedia and interactive mass media becoming more popular, the boundary between the computer program as we know it and the radio or TV program, whether it is meant to be entertaining or educational, will become blurred. For instance, the digital audio broadcasting (DAB) system provides for transmitting objects that are broadcast in file format and loaded in the storage media of the receiving equipment to be later interactively reproduced to a user so that the user will have the opportunity to change the flow of the program.
Since digital recordings are easily duplicated, there has arisen a need to encrypt, or scramble, the objects in connection with transmission and storage so that their reception and reproduction without a permission from their copyright owners be as difficult as possible. The purpose of this arrangement is that the producer and or distributor of an object get a certain remuneration from the receiver and/or user. It is common that a user acquires a decoding device or key with which the object can be descrambled for use. A so-called black box is known from the prior art which de- scrambles programs sent on TV channels liable to charges. A descrambling device may be controlled by a so-called smart card, for example, which contains the code words needed for descrambling. A similar method, where a scrambled transmission is descrambled using keys stored in a smart card, has been applied in digital data transmission in the GSM mobile telephone system, for example.
Scrambling and descrambling methods and devices according to the prior art are usually characterized in that they are channel specific which means the scrambling is directed to a particular transmission stream always in the same way regardless of what objects the transmission stream contains. The only options are switching the scrambling on and off, if e.g. a pay TV channel wants to send a particular film or program unscrambled so that it can be viewed by a larger audience. Copyrights, however, are always directed to individual objects and, therefore, methods accord¬ ing to the prior art cannot implement a pay system where the producers of objects acquired from different sources could be remunerated in any other way than if the transmitting station pays for the right to broadcast a particular object in its distribution network or coverage area.
Arrangements according to the prior art are also characterized in that a receiver who has at his disposal a descrambling device can without limitation store, duplicate and further distribute a particular object after having descrambled it. To safeguard the rights of parties producing objects and their transmission and distribution services it is essential that users could be obliged to pay a separate recompense for storing and duplicating an object.
In conjunction with computer software it is used a fixed key device, or a so-called hardlock, which usually comprises an electric circuit cast in a plastic housing that has to be inserted in the communications port of the computer for the program to be usable. With this arrangement it is to some extent possible to prevent the duplication of an object because an ordinary user cannot duplicate the hardlock and a duplicated program copy will not function without the hardlock. However, the arrangement is rather inflexible as the hardlock is tied to a particular version of a particular object, and it cannot be applied on a broader basis if the objects vary and change constantly as they do in a broadcast-type transmission.
An object of this invention is to provide a method for scrambling and descrambling electrically transmitted objects, covering the transmission, reception, storing and reproduction of objects. Another object of the invention is to provide a method which attaches to said scrambling a payment system whereby recompenses cor¬ responding to the descrambling rights are directed to parties producing objects and transmission and distribution services for the objects. A further object ofthe invention is that the method according to it be applicable to known digital transmission and storing arrangements.
The objects of the invention are achieved by defining general, standardized scrambl¬ ing data formats to be applied in the broadcasting and storage of digital data, using different scrambling data formats for storing and broadcasting. The achievement of the objects of the invention can be further advanced by adding to the user's de¬ scrambling device a real time clock, combining a real time code to the digital broadcast format and by combining the payment transactions corresponding to the descrambling rights to the distribution of descrambling keys.
The method according to the invention for protecting digital media objects against unauthorized use, which objects can be electrically distributed to several receivers and stored on a memory medium for later use, wherein a scrambled broadcast format is specified for said media objects, is characterized in that a scrambled storage format is also specified for said media objects for the storing on said memory medium, which scrambled storage format is different from said scrambled broadcast format.
The invention is also directed to terminal equipment for receiving, storing and reproducing digital media objects to a user, said terminal equipment comprising means for descrambling the scrambled broadcast format. The terminal equipment according to the mvention is characterized in that it further includes means for storing a received media object in a scrambled storage format which is different from said scrambled broadcast format. The invention implies that a common international agreement or standard can define different scrambled formats or identification procedures for digital media objects according to whether they are being transmitted or stored. In addition, different formats or identification procedures can be specified for an object according to whether it is the original version (produced by the copyright owner) or a copy produced by someone else. Devices handling digital media objects are manufactured such that they can reproduce a received or stored object only if they have at their disposal the key that authorizes the reproduction ofthe object in question. Further- more, in an advantageous embodiment of the invention, the devices will not store broadcast-format objects but will first convert them into the storage format. Objects are advantageously handled as constant-size data parts, or frames, so that the dif¬ ference between the broadcast format and storage format may be as small as a change of one bit or bit combination in the frame header part or other data structure describing the contents of the packet.
The scrambling method according to the invention further comprises a timing ar¬ rangement wherein the objects transmitted are time-stamped, ie. provided with data representing the transmission moment. Then, even if an object were stored in the broadcast format, its unauthorized reproduction at a later time can be prevented if the reproducing device first has to compare the stored time data to the real time. If the times are unidentical, reproduction is prohibited. The timing arrangement is based on an electrical memory medium which is advantageously a smart card or such. Below, this portable memory medium will be called a smart card. In the ar- rangement according to a preferred embodiment of the invention the smart card includes a real time clock, which refers to any circuit in general which, when read at an arbitrary moment of time, unequivocally yields the data representing the time of the reading. According to the invention, each object is arranged both for trans¬ mission and storage into data parts that can be called frames, packets, cells or data groups and that are formatted according to existing standards and recommendations describing data transmission and/or storage. At least part ofthe frames and data groups are provided with a time stamp which in the case of broadcasting refers to the time of transmission and in the case of storage to the time of storing.
The contents of an object to be transmitted or distributed as an original recording (such as a CD) are scrambled using a known method where descrambling requires a certain cipher key which advantageously is a relatively big binary number. A user may purchase the right to use the object in question so that when he pays a certain sum of money, the necessary key or keys will be loaded into his smart card. A key may be valid for a fixed or an indefinite period of time. In the case of a transmitted object the user pays a different sum according to whether he uses the object just once (real time use) or stores (copies) it to be used later and possibly several times. 'Using' here means broadly viewing, listening to or otherwise exploiting the object. Because ofthe different prices for the real time use and storage the keys stored in the smart card have to be different for the different purposes of use.
The invention is described in more detail with reference to the preferred embodi- ments presented by way of example and to the attached drawing, in which
Fig. 1 shows one phase in the application of the method according to the invention, Fig. 2 shows as a series of pictures other phases in the application of the method according to the invention,
Fig. 3 shows an alternative way of applying the method according to the invention, and Fig. 4 shows another alternative way of applying the method according to the invention.
Like elements in the drawing are depicted by like reference designators.
Since the invention provides for the broadcasting of digital objects, it will be first described the essential features of the digital audio broadcasting (DAB) system used here as an illustrative application. In the DAB system, the information in an audio transmission and in a data transmission in general is transported in constant-size data parts that in the case of an audio transmission are called audio frames and in the case of a data transmission data groups. Each audio frame and data group includes a header part containing records or fields describing its contents, and a payload part that contains the actual data to be transmitted. In addition, the DAB system specifies in the way known to one skilled in the art data structures that are used for transferring both frame-specific and more general control information from the transmitting to the receiving device. The most important forms of such data structures are the fast information groups (FIG) transferred on the so-called fast information channel (FIC) and, in the case of audio frames, the frame-specific program associated data (PAD) fields. The DAB system specifies the following audio frame specific data and their transmission along with a scrambled audio broadcast:
1 a) scrambling of frame with a known or encrypted key In the DAB system, scrambling and encrypting mean different things.
Scrambling means changing the audio data such that the sound contained in it cannot be reproduced without knowing a certain key. Said key is a number which, when fed as a seed to a certain generator producing pseudo-random numbers, produces a pseudo-random bit sequence corresponding to the key in question. A logical XOR (exclusive-OR) operation executed between the bit sequence and the scrambled audio data produces reproducable audio data. This operation opposite to scrambling is called descrambling. The key, which is given to the user, may be clear (known) or encrypted; in the latter case, the encrypted key must first be decrypted. There exist several arrangements to implement the encryption of the key and we will return to them later on. This paragraph refers to the fact that the audio frame specific data in the DAB system indicate whether the frame in question is scrambled using a known or an encrypted key.
lb) conditional access system used
The encryption procedure as a wider concept is included in the conditional access system which includes several specifications related to the access rights of services. Known conditional access systems include Eurocrypt and NR- MSK, among others. The conditional access system applied can be indicated for each frame.
lc) cryptoalgorithm
Code for a certain algorithm identifying the calculatory method applied in the key encryption procedure.
Id) time stamp
A time stamp referring to the date and/or time of day can be included in the frames so that it corresponds to the time of transmission.
le) authorization data
Frames can include identification information which identifies the object transmitted and e.g. the party that produced the object and is the holder of the copyright of the object. If) encrypted key
lg) initialization modifiers
Typically, a scrambling key is valid for a few frames only. Furthermore, a so- called initialization, or reset, can be performed between those frames, too, resetting the pseudo-random bit sequence generator used in the descrambling so that possible errors in the long bit sequence be less harmful. The initial¬ ization modifiers define how the generator will be initialized.
lh) scrambled audio frame to be transmitted
In addition, the DAB system specifies the following data group specific information and its transmission along with a scrambled data transmission:
2a) scrambling of frame with a known or encrypted key Same as la.
2b) conditional access system used Same as lb.
2c) cryptoalgorithm Same as l c.
2d) time stamp Same as Id.
2e) authorization data Same as 1 e.
2f) encrypted key
2g) initialization modifiers Same as lg.
2h) scrambled data group to be transmitted In addition, the DAB recommendations specify file-specific transmission as regards the following information:
2i) file name or id number
2j) number of data groups (blocks, segments) in the file
2k) file size in bytes
21) file version number for modified files.
Next, we will have a look at the frame specific data that according to the invention will be attached to audio frames to be stored. The number, order and size of the records presented as well as the bit value and bit combination definitions are given by way of example only and are not intended to limit the invention.
3 a) audio frame count, 24 bits
Stored frames related to a particular object are consecutively numbered. The proposed 24-bit numbering field can be used to identify 2^4 frames. If each frame corresponds, according to the DAB standard, to a 24-millisecond play¬ back period, the maximum duration of the stored object is about 4lΛ days. The consecutive numbering of frames is advantageous especially in operations such as fast rewind, fast forward and search.
3b) original / copy, 1 bit
One so-called flag bit indicates whether the object is an original version or a copy. For example, flag bit value 1 refers to an original and 0 to a copy. A storing (copying) device has to be built such that it sets the frame-specific flag bit to 0.
3c) storage attributes, 2 bits
With two bits it is possible to indicate what kind of use is allowed for the object in question. The tables below show an advantageous specification of bit combinations. table 1 : scrambled audio object
bit bl bit bO meaning
0 0 original object and copy can be stored unscrambled
0 1 original object and copy can be stored scrambled
1 0 original object can be stored unscrambled but copy cannot be stored
1 1 original object can be stored scrambled but copy cannot be stored
table 2: unscrambled audio object
bit bl bit bO meaning
0 O or l original object and copy can be stored unscrambled
1 O or l original object can be stored unscrambled but copy cannot be stored
3d) frame scrambled bit, 1 bit
One flag bit indicates whether the frame in question is scrambled or not. Inside a scrambled object there may be unscrambled frames, so it is advantageous to have a frame-specific scrambling indication.
3e) frame scrambled with a known or encrypted key, 1 bit
Same as la. Flag bit value 1 corresponds to a clear key and value 0 to an encrypted key.
3f) conditional access system used, 3 bits
Same as lb. With three bits it is possible to identify 8 different conditional access systems at the most.
3g) cryptoalgorithm, 6 bits
Same as lc. With six bits it is possible to identify 64 different crypto- algorithms at the most.
3h) storage information, 21 bits
This field is divided into two subfields: * storage medium identifier, 4 bits, e.g. as in the table below (rest ofthe bit combinations are reserved for future expansion)
b3 bO medium
0 0 0 0 broadcast
0 0 0 1 tape
0 0 1 0 CD
0 0 1 1 hard disk
0 1 0 0 remote storage, e.g. in local area network
* date, 8 + 4 + 5 bits, including the last two digits ofthe year (0 to 9, both coded with 4 bits), the ordinal number ofthe month (1 to 12 coded with 4 bits) and the day ofthe month (1 to 31 coded with 5 bits) and corresponding in the case of local storage to the storage date and in the case of broadcast or network storage the current date.
i) authorization data, 261 bits
Since the total number of bits presented so far is not divisible evenly by 8 and since it is advantageous to begin certain byte specific data from the byte boundary, this field advantageously starts with 5 padding bits which are all ones. They are followed by a 32-byte (256-bit) authorization data field which can contain information depending on the conditional access system used, such as the service provider identification code, program identification code and program classification.
3j) encrypted or unencrypted key, 168 bits
This field is divided into three subfields that are as follows:
* number of remaining frames with a key (8 bits), which indicates for how long the current key will be used for descrambling,
* current key (80 bits), and * next key (80 bits).
The two-key arrangement gives to the receiving or reproducing device time to decrypt the next encrypted key. When the count of remaining frames reaches zero, the new key becomes the current key and the next key becomes the new key. The real length ofthe key depends on the scrambling system used and on the encryption method of the key, so the 80 bits mentioned here is just the maximum length. 3k) initialization modifiers, 40 bits Same as 1 g.
31) standard for the audio frame structure, 8 bits
Since, according to the invention, the storage format is not tied to any particular audio frame structure, it is advantageous to indicate in the stored frame data the standard with which the frame complies. The frame may be e.g. an ISO/LEC 11172-3 Layer II or Layer III frame in accordance with the motion picture experts group (MPEG) standards or a DAB audio frame. When coding the standard identifier with eight bits, ample space is left in reserve for future frame standards.
3m) hash sum for 3a to 31, 88 bits The fields described above in 3a to 31 are advantageously left unscrambled so that they can be read as quickly as possible in connection with reception and/or playback. However, they have to be somehow protected against un¬ authorized modification. According to the invention, a so-called hash algo¬ rithm is used in a known manner, said algorithm being identified by the 8 first bits in the 3m field and used to calculate a certain 80-bit result on the basis of the bit contents of said fields. By comparing the contents of fields 3a through 31 to the hash sum it is possible to detect whether the contents of the fields have been changed after the hash sum was calculated. Since an unauthorized device does not know the hash algorithm, it cannot change the hash sum to correspond to the modified header field values.
3n) stored scrambled or unscrambled audio frame, variable length
In the beginning of the frame there is a 16-bit length subfield indicating the length of the audio frame in bytes. The length of the frame depends on the encoding method, level of compression and possible ancillary data (program associated data, PAD, in the DAB). Inclusion of the length information in the beginning of the frame helps operations such as fast rewind, fast forward and search.
Next, we will have a look at the data group specific information attached according to the invention to the data groups stored. From the point of view of the invention it is not essential how the file specific information (2i to 21) is stored since according to the invention the scrambling and protection arrangements are performed on the data group level. The number, order and size of the records presented and the bit value and bit combination specifications are presented by way of example only and are not intended to limit the invention.
4a) data group numbering, 24 bits
Data groups related to a particular file are consecutively numbered. In this sense, the data groups can be called blocks or segments. The consecutive numbering is advantageous especially in operations such fast rewind, fast forward and search.
4b) original / copy, 1 bit Same as 3b.
4c) storage attributes, 2 bits Same as 3c.
4d) data group scrambled bit, 1 bit Same as 3d.
4e) data group scrambled with a known or an encrypted key, 1 bit Same as 3e.
4f) conditional access system used, 3 bits Same as 3f.
4g) cryptoalgorithm, 6 bits Same as 3g.
4h) storage information, 21 bits Same as 3h.
4i) authorization data, 261 bits Same as 3i.
4j) encrypted or unencrypted key, 168 bits Same as 3j. 4k) initialization modifiers, 40 bits Same as 3 k.
41) hash sum for 4a to 4k, 88 bits Same as 3m.
4m) stored scrambled or unscrambled data group, variable length Same as 3n.
Let us next consider the real time clock in the smart card as part of the implement¬ ation of the arrangement according to the invention. There are good reasons to in¬ clude the real time clock in the system because then it becomes possible to dis¬ tinguish between the immediate reproduction of a received broadcast object and a later reproduction of an object stored (illegally) in the broadcast format. As was mentioned earlier, devices that store digital objects should be designed and built such that they cannot store objects in the broadcast format but in connection with the storing change certain bits in the storage information field (3h / 4h above) so that they indicate the storage medium. However, it is possible to build a "pirate" device that does not change the bits in question but simply stores the object in the broadcast format. But as the pirate device does not know the calculation algorithm for the hash sum (3m / 41 above) it cannot change the frame or data group time stamp and calculate a corresponding new hash sum. Since it is required of re¬ production devices that they compare the time stamps in the frames or data groups of broadcast-format objects to their own real time clocks before allowing re- production, a recording made by a pirate device can be reproduced only using a similar pirate device where the time stamp comparison to the real time clock is bypassed. It is, however, probable that all legally sold reproduction devices include said comparison feature, so the arrangement can at least to a large extent prevent the sales of pirate copies stored in the broadcast format to those users who own a legal device.
Said real time clock is advantageously located in the smart card because then its unauthorized changing can be prevented in the same known way as the changing of other information in the smart card. Furthermore, it can be required that when a user presents his smart card to an authorized dealer for new keys to be loaded in it in the manner described later on, the new keys will not be loaded if the clock in the smart card has been tampered with. If the time stamps are made, as proposed above, at the accuracy of one day, there follows that, first, the real time clock need not be readable at a greater accuracy than that and, second, objects stored in the broadcast format can be freely used during that one day. If a stricter time control is to be applied, then more bits will have to be reserved in the frames and data groups for the time stamp.
For continuous operation ofthe real time clock the smart card has to be provided with a power supply, which is advantageously a small rechargeable battery that can be charged always when the smart card is connected to a receiver and/or playback device. When the battery voltage drops below a certain threshold value, the real time clock is advantageously set in a shut-down state where its operation is pro¬ hibited, and it can be made operational again only by an authorized dealer at an authorized shop or through a secure two-way telecommunications link. The secret information needed for the removal of the shut-down state is advantageously stored in the permanent memory ofthe smart card when the card is delivered to the user. A similar operation by an authorized dealer is required if the real time clock in the smart card has to be set to a new time, e.g. when crossing time zones, if the system does not use a certain standard time (such as the Greenwich Mean Time, GMT) in all its operations.
A device for an ordinary user which receives and/or reproduces digital objects can read and display to the user the time shown by the real time clock in the smart card but it cannot change it without authorization from an authorized dealer.
Referring to Figs. 1 to 4, it will be now described the selling and transferring of various rights and corresponding keys in the system according to the invention enabling payments to the parties who own the rights related to the objects and/or their broadcasting. In the embodiments depicted by way of example the parties are the publisher (PUB; also content provider), broadcaster (BR; also service provider) and the user (U) of the object. The encircled numbers in the drawing represent one possible mutual order of the various steps, without limiting the invention, though.
In the case depicted by Fig. 1 , a user U buys from a representative of a publisher PUB a record CD which contains the desired object. The publisher has manu¬ factured the record in such a way that the data is in scrambled form (S) and the keys needed for descrambling, which are included in the frames of the record (3j and 4j above), are encrypted. The price of the record corresponds to the manufacturing and transportation costs and does not include the charge for the right of use of the contents of the record. The key needed for decrypting the encrypted keys is called an authorization and is marked Al . By paying the appropriate sum $ the user gets the authorization.
The events in Fig. 1 , in the order of their occurrence, are as follows:
© A publisher PUB produces a record CD in scrambled form (S) and attaches to it the encrypted keys. An authorization Al is needed for decrypting the keys.
© A user U pays to the publisher PUB both the price of the record CD and the charge $ for the right of use of the contents of the record.
® The publisher PUB gives to the user U the authorization Al needed for the decrypting by storing it in the user's smart card SC.
® The user inserts the smart card SC and the record CD in a playback device (not shown) which then uses the authorization Al to decrypt the keys and descrambles (US) the stored object while reproducing the object to the user.
The authorization Al may be different and have different prices according to whether it entitles the user U only to use the stored object or also to copy it. The authorization may be publisher-specific, covering all products of a particular pub¬ lisher, in which case the identification information related to the object in question has to be stored in the smart card SC in addition to the authorization. If the user later buys another product from the same publisher, the authorization need not be loaded again in the smart card but only the identification information of the new product.
In the case depicted by Fig. 2, a user U acquires from a publisher PUB the right to use objects produced by said publisher and transmitted by a broadcaster BR. The idea is that a publisher-specific authorization Al and a certain amount of money are loaded in the user's smart card SC against a certain payment $. The publisher PUB transfers an object to the broadcaster BR so that the object is already scrambled (S) and its scrambling keys are encrypted and require an authorization Al . The broad¬ caster broadcasts the object in question, which is then received and descrambled (US) by a device of the user U using the authorization Al . The events in Fig. 2, in the order of their occurrence, are as follows:
© A user U pays to a publisher PUB a publisher-specific license fee $. CD The publisher PUB gives an authorization Al needed in the decrypting to the user U by storing it in the user's smart card SC. At the same time, a certain amount of "electronic money" $$$ is loaded in the smart card.
<D The publisher transfers a scrambled (S) object to a broadcaster BR and attaches to it the encrypted keys. An authorization Al is needed to decrypt the keys.
© The broadcaster BR broadcasts the object.
© The user inserts the smart card SC in a receiver and playback device (not shown) which then uses the authorization Al to decrypt the keys and descrambles (US) the received object while reproducing the object to the user. At the same time, certain amount of electronic money in the smart card SC is marked spent.
Electronic money loaded in the smart card is marked spent in proportion as the user receives and uses broadcast objects. The amount marked spent advantageously de¬ pends on whether the user just reproduces the received object or stores it for later use. The identification information needed for identifying a certain object and the prices corresponding to the different purposes of use are broadcasted along with the object.
Fig 3. depicts a situation where a broadcaster BR purchases objects from a publisher PUB and distributes them free of charge to users U. The situation is otherwise the same as in Fig. 2, but the payments are made between the publisher PUB and the broadcaster BR, and the broadcaster BR gets the authorization Al needed for the decryption. The broadcaster descrambles (US) the object and broadcasts it either entirely unscrambled or scrambled with unencrypted keys which the receiving device can read direct from the broadcast (cf. 3e and 4e above). Then, no money is marked spent in the user's smart card and, indeed, the user has no need for any authorization for which he should pay.
The concept of electronic money in connection with smart cards is known as such. A smart card may contain either "common money", meaning that an amount of money loaded in the smart card can be used for paying any charges to anyone, or money marked for a certain purpose. In the system according to the invention this means especially that common money could be used for paying for objects from any publisher, whereas money marked for a certain purpose, ie. for a single publisher. could only be used for paying for objects coming from that particular publisher. The latter arrangement is the better since the pubi.sher gets the money already in connection with the loading ofthe authorization, and there will be no confusion about what has been paid, to whom and for what services.
The embodiment of the invention described above, referring to Fig. 2, has the disadvantage that if a user has not acquired a publisher-specific authorization Al, he cannot use any objects from that particular publisher PUB broadcasted scrambled by a broadcaster BR. This disadvantage can be eliminated by an alternative embodi- ment according to Fig. 4 wherein a user U pays $ for a broadcaster-specific author¬ ization A2 and loads in his smart card electronic money marked for that broadcaster BR. A publisher PUB transfers an object to the broadcaster BR so that the object is scrambled (S) and its scrambling keys are encrypted and require an authorization Al . The broadcaster BR decrypts the keys and descrambles (US) the object but then scrambles (S) the object again so that the new scrambling keys are encrypted and require an authorization A2. The broadcaster broadcasts the object which is then received and descrambled (US) by a device of the user U using the authorization A2.
If the agreement between the broadcaster BR and the publisher PUB requires that the publisher get paid according to how much the users have used the publisher's objects, the user's smart card SC divides the broadcaster-specific amount of money into publisher accounts and charges the accounts according to the use (direct use, storing, copying) of the objects. Later the user takes his smart card to be read by the broadcaster, publisher or an authorized dealer, where the accounts are read and the broadcaster then has to pay the corresponding sums to the publishers. The smart card can also be read at the user's home through a secure two-way communications link. To motivate the user to have his card read, the authorizations can be arranged so that the user cannot later use a stored object before the respective accounts in the smart card have been settled.
The events if Fig. 4, in the order of their occurrence, are as follows:
Φ A publisher PUB and a broadcaster BR agree on broadcasting and the publisher PUB gives to the broadcaster BR an authorization Al needed for decryption.
© A user U pays to the broadcaster BR a broadcaster-specific license fee $. ® The broadcaster gives to the user U an authorization A2 needed for decryption by storing it in the user's smart card SC. At the same time, a certain amount of "electronic money" is loaded in the smart card.
© The publisher PUB delivers an object in a scrambled form (S) to the broadcaster and attaches to it the encrypted keys. An authorization Al is needed to decrypt the keys.
© The broadcaster BR uses authorization Al to decrypt the scrambling keys and descrambles (US) the received object but then scrambles (S) it again so that authorization A2 is needed for the decryption. The broadcaster then broadcasts the object.
© The user inserts the smart card SC in a receiver and playback device (not shown) which then uses authorization A2 to decrypt the scrambling keys and descrambles (US) the received object while reproducing the object to the user. At the same time, certain amount of electronic money in the smart card SC is marked spent.
© If required by the agreement between the publisher and the broadcaster, the user has his smart card SC read, and the broadcaster BR pays license fees to the pushlisher PUB on the basis of the data in the smart card.
All above-mentioned authorizations loaded in the user's smart card can be valid for a fixed period of time or until further notice. The real time clock in the smart card is useful in the implementation of the fixed-period feature because then the receiver and playback devices need not have a clock. It is also more difficult to tamper with a clock in the smart card than with a clock in a certain device.
If the reception and use of an object are recorded in the smart card, it can be so arranged that by presenting his smart card to an authorized dealer the user is able to show that he has already paid for the use of the object and can then have the original record for a small extra charge as in Fig. 1.
The invention requires no changes in known object broadcasting media since the scrambling of digital objects in broadcasting is known in the prior art. A terminal equipment according to the invention has to include means for receiving and de¬ scrambling a transmission scrambled using a known method and for decrypting the scrambling keys by means of an authorization stored on a memory medium. In addition, a storing terminal equipment has to include means for producing the storage format described above in the storing phase, and for reading it in the play¬ back phase. These means are advantageously realized as software processes executed by a microprocessor controlling the operation ofthe terminal equipment or another programmable device operating under its control, such processes being routinely drawn up by those skilled in the art.

Claims

Claims
1. A method for protecting digital media objects against unauthorized use, said objects being electrically distributable to several receivers and storable on a memory medium for later use, wherein a scrambled broadcast format is defined for said media objects, characterized in that also a scrambled storage format is defined for said media objects for said storage on a memory medium, which scrambled storage format is different from said scrambled broadcast format.
2. The method of claim 1 , characterized in that in said scrambled storage format a media object is divided into frames which have a predetermined structure and contain actual data to be stored and other information related to the storage.
3. The method of claim 2, characterized in that to distinguish from said scrambled broadcast format said other information in the frames includes a piece of information saying that the format is a storage format.
4. The method of claim 2 or 3, characterized in that at least part of said other information in the frames is protected by including in the storage format a data part the contents of which is determined on the basis of the information to be protected in a manner determined by a secret algorithm.
5. The method of any one of the preceding claims, characterized in that said scrambled broadcast format and scrambled storage format include a time stamp which in the broadcast format refers to the time of broadcasting and in the storage format to the time of storing.
6. The method of claim 5, characterized in that it is also required that when a media object is reproduced to a user, it is examined whether the object in question is in the broadcast format, and if it is, the time stamp included in the broadcast format is compared to the time of reproduction, so that a difference greater than a pre¬ determined maximum between the time stamp in the broadcast format and the time of the reproduction prevents the object from being reproduced.
7. The method of any one of the preceding claims, characterized in that the entitlement to use and/or store a particular media object is delivered to the user in the form of a key stored on a portable memory medium.
8. The method of claims 6 and 7, characterized in that the time of reproduction is read from a clock included in said portable memory medium.
9. Terminal equipment for receiving, storing and reproducing to a user digital media objects, comprising means for descrambling a scrambled broadcast format, characterized in that it also comprises means for storing a received media object in a scrambled storage format which is different from said scrambled broadcast format.
10. The terminal equipment of claim 9, characterized in that it comprises means to decode a time stamp included in the broadcast format in connection with the reproduction of the media object and to compare said time stamp to the time of reproduction.
11. The terminal equipment of claim 10, characterized in that it comprises means to read the time of reproduction from a portable memory medium.
PCT/FI1997/000045 1996-01-30 1997-01-29 Scrambling of digital media objects in connection with transmission and storage Ceased WO1997028649A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
AU15482/97A AU1548297A (en) 1996-01-30 1997-01-29 Scrambling of digital media objects in connection with transmission and storage
US09/117,221 US6222924B1 (en) 1996-01-30 1997-01-29 Scrambling of digital media objects in connection with transmission and storage
DE69720421T DE69720421T2 (en) 1996-01-30 1997-01-29 Scrambling of digital data media during transmission and storage
EP97901648A EP0878096B1 (en) 1996-01-30 1997-01-29 Scrambling of digital media objects in connection with transmission and storage
JP9527329A JP2000504169A (en) 1996-01-30 1997-01-29 Scrambling digital media objects linked to transmission and storage

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI960418A FI100563B (en) 1996-01-30 1996-01-30 Encryption of digital presentation objects during transmission and recording
FI960418 1996-01-30

Publications (1)

Publication Number Publication Date
WO1997028649A1 true WO1997028649A1 (en) 1997-08-07

Family

ID=8545153

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI1997/000045 Ceased WO1997028649A1 (en) 1996-01-30 1997-01-29 Scrambling of digital media objects in connection with transmission and storage

Country Status (7)

Country Link
US (1) US6222924B1 (en)
EP (1) EP0878096B1 (en)
JP (1) JP2000504169A (en)
AU (1) AU1548297A (en)
DE (1) DE69720421T2 (en)
FI (1) FI100563B (en)
WO (1) WO1997028649A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999035801A1 (en) * 1998-01-07 1999-07-15 Microsoft Corporation System for transmitting subscription information and content to a mobile device
WO2000004717A1 (en) * 1998-07-17 2000-01-27 Thomson Licensing S.A. A conditional access system for broadcast digital television
WO2001011883A1 (en) * 1999-08-10 2001-02-15 Intel Corporation System and method for securely distributing content to groups of receivers
EP1150511A1 (en) * 2000-04-13 2001-10-31 Canon Kabushiki Kaisha Information processing apparatus and method
EP1280350A1 (en) * 2001-07-26 2003-01-29 Irdeto Access B.V. Time validation system
US6871048B2 (en) * 1998-04-28 2005-03-22 Sony Corporation Mobil communication apparatus and information providing system using the mobile communication apparatus
US8098820B2 (en) 2001-03-14 2012-01-17 Thomson Licensing Conditional access system for broadcast digital television
US8468101B1 (en) * 2000-05-26 2013-06-18 Sony Corporation Electronic money system and payment accepting apparatus

Families Citing this family (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001527333A (en) 1997-12-19 2001-12-25 ブリティッシュ・テレコミュニケーションズ・パブリック・リミテッド・カンパニー data communication
US6944299B1 (en) * 1998-12-02 2005-09-13 At&T Wireless Services, Inc. Method for synchronous encryption over a communication medium
US6697489B1 (en) * 1999-03-30 2004-02-24 Sony Corporation Method and apparatus for securing control words
US7565546B2 (en) * 1999-03-30 2009-07-21 Sony Corporation System, method and apparatus for secure digital content transmission
US7730300B2 (en) * 1999-03-30 2010-06-01 Sony Corporation Method and apparatus for protecting the transfer of data
US7039614B1 (en) 1999-11-09 2006-05-02 Sony Corporation Method for simulcrypting scrambled data to a plurality of conditional access devices
US7225164B1 (en) * 2000-02-15 2007-05-29 Sony Corporation Method and apparatus for implementing revocation in broadcast networks
JP2002152654A (en) * 2000-11-15 2002-05-24 Sony Corp Information recording apparatus and billing method therefor
FR2823936B1 (en) * 2001-04-19 2003-05-30 France Telecom METHOD AND SYSTEM FOR CONDITIONAL ACCESS TO IP SERVICES
US7895616B2 (en) 2001-06-06 2011-02-22 Sony Corporation Reconstitution of program streams split across multiple packet identifiers
US7151831B2 (en) 2001-06-06 2006-12-19 Sony Corporation Partial encryption and PID mapping
US7350082B2 (en) 2001-06-06 2008-03-25 Sony Corporation Upgrading of encryption
US7747853B2 (en) * 2001-06-06 2010-06-29 Sony Corporation IP delivery of secure digital content
US7302059B2 (en) * 2002-01-02 2007-11-27 Sony Corporation Star pattern partial encryption
US7376233B2 (en) 2002-01-02 2008-05-20 Sony Corporation Video slice and active region based multiple partial encryption
US7823174B2 (en) 2002-01-02 2010-10-26 Sony Corporation Macro-block based content replacement by PID mapping
US7215770B2 (en) 2002-01-02 2007-05-08 Sony Corporation System and method for partially encrypted multimedia stream
US7292690B2 (en) 2002-01-02 2007-11-06 Sony Corporation Video scene change detection
US7765567B2 (en) 2002-01-02 2010-07-27 Sony Corporation Content replacement by PID mapping
US7155012B2 (en) * 2002-01-02 2006-12-26 Sony Corporation Slice mask and moat pattern partial encryption
KR100962420B1 (en) 2002-01-14 2010-06-14 이르데토 아인드호벤 비.브이. Distribution of Encrypted Information
FR2836322B1 (en) * 2002-02-15 2004-07-30 France Telecom PROCESS FOR CONTROLLING ACCESS TO CONTENT BY A TERMINAL, TERMINAL, USER RIGHTS SERVER, DISTRIBUTION PLC, PROVIDER SERVER, DATA MEDIA AND ASSOCIATED SYSTEM
US20040006541A1 (en) * 2002-07-08 2004-01-08 International Business Corporation Method and system for purchasing broadcast content
US8818896B2 (en) 2002-09-09 2014-08-26 Sony Corporation Selective encryption with coverage encryption
US7724907B2 (en) 2002-11-05 2010-05-25 Sony Corporation Mechanism for protecting the transfer of digital content
US8572408B2 (en) * 2002-11-05 2013-10-29 Sony Corporation Digital rights management of a digital device
US7949047B2 (en) * 2003-03-17 2011-05-24 Qualcomm Incorporated System and method for partial intraframe encoding for wireless multimedia transmission
US7409702B2 (en) 2003-03-20 2008-08-05 Sony Corporation Auxiliary program association table
US7292692B2 (en) * 2003-03-25 2007-11-06 Sony Corporation Content scrambling with minimal impact on legacy devices
US7145567B2 (en) * 2003-04-03 2006-12-05 Avid Technology, Inc. Bitstream format and reading and writing methods and apparatus therefor
IL155416A0 (en) * 2003-04-13 2003-11-23 Nds Ltd System for securing access to data streams
US7286667B1 (en) 2003-09-15 2007-10-23 Sony Corporation Decryption system
US7346163B2 (en) 2003-10-31 2008-03-18 Sony Corporation Dynamic composition of pre-encrypted video on demand content
US7343013B2 (en) 2003-12-16 2008-03-11 Sony Corporation Composite session-based encryption of video on demand content
US7620180B2 (en) 2003-11-03 2009-11-17 Sony Corporation Preparation of content for multiple conditional access methods in video on demand
US7853980B2 (en) 2003-10-31 2010-12-14 Sony Corporation Bi-directional indices for trick mode video-on-demand
US20060018470A1 (en) * 2004-07-09 2006-01-26 Nokia Corporation Managing traffic keys during a multi-media session
US20060034321A1 (en) * 2004-07-09 2006-02-16 Nokia Corporation Method for receiving a time slice burst of data
US8379864B2 (en) * 2004-07-09 2013-02-19 Nokia Corporation Software plug-in framework to modify decryption methods in terminals
CN101073259A (en) * 2004-12-08 2007-11-14 三星电子株式会社 Encryption method and device in conditional access system for digital broadcasting
US8041190B2 (en) 2004-12-15 2011-10-18 Sony Corporation System and method for the creation, synchronization and delivery of alternate content
US7895617B2 (en) 2004-12-15 2011-02-22 Sony Corporation Content substitution editor
US8407146B2 (en) * 2005-10-28 2013-03-26 Microsoft Corporation Secure storage
US7703012B2 (en) * 2005-12-13 2010-04-20 Cbs Interactive, Inc. Adaptable transfer and publication of digital media
US8185921B2 (en) 2006-02-28 2012-05-22 Sony Corporation Parental control of displayed content using closed captioning
US7555464B2 (en) 2006-03-01 2009-06-30 Sony Corporation Multiple DRM management
EP1962448A1 (en) * 2007-02-23 2008-08-27 INOVA Semiconductors GmbH Method and system for transmitting a serial data frame
US8406252B1 (en) * 2007-04-05 2013-03-26 At&T Mobility Ii Llc Presence-based network service availability announcements
DE102007039226A1 (en) * 2007-08-20 2009-02-26 Giesecke & Devrient Gmbh Real-time measurement on a portable data carrier
US8117449B2 (en) * 2007-12-27 2012-02-14 Mastercard International, Inc. Method to detect man-in-the-middle (MITM) or relay attacks
KR101480559B1 (en) * 2008-07-31 2015-01-08 엘지전자 주식회사 Information display method using a portable terminal and a portable terminal
US8848914B2 (en) * 2008-11-18 2014-09-30 Qualcomm Incorporated Spectrum authorization and related communications methods and apparatus
JP4886831B2 (en) * 2009-10-15 2012-02-29 株式会社東芝 Content recording apparatus, reproducing apparatus, editing apparatus and method thereof
US8375225B1 (en) 2009-12-11 2013-02-12 Western Digital Technologies, Inc. Memory protection
KR101673598B1 (en) * 2010-03-12 2016-11-22 삼성전자주식회사 Method and apparatus for reporting audience measurement in content transmission system
FR2970134B1 (en) * 2010-12-29 2013-01-11 Viaccess Sa METHOD FOR TRANSMITTING AND RECEIVING MULTIMEDIA CONTENT
GB2507551A (en) * 2012-11-04 2014-05-07 Julian Andrew John Fells Copyright protection by comparing identifiers of first and second electronic content
WO2017031744A1 (en) * 2015-08-27 2017-03-02 华为技术有限公司 Method for encrypted call and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1991013517A1 (en) * 1990-02-21 1991-09-05 Kudelski S.A. Fabrique D'enregistreurs Nagra Video signal scrambling and unscrambling device
EP0666694A1 (en) * 1994-02-02 1995-08-09 General Instrument Corporation Of Delaware Method and apparatus for controlling access to digital signals
EP0674440A2 (en) * 1994-03-21 1995-09-27 NOKIA TECHNOLOGY GmbH A process for encryption and decryption of a bit stream containing digital information
EP0710025A1 (en) * 1994-10-28 1996-05-01 Sony Corporation Digital signal transmitting methods, digital signal receiving apparatus, and recording media

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5150407A (en) * 1991-12-16 1992-09-22 Chan Steve S C Secured data storage devices
US5590195A (en) * 1993-03-15 1996-12-31 Command Audio Corporation Information dissemination using various transmission modes
EP0711479A4 (en) 1993-07-26 1996-10-02 Elonex Technologies Inc ENCRYPTION SYSTEM FOR A CD PROM
US5475757A (en) 1994-06-07 1995-12-12 At&T Corp. Secure data transmission method
US5923763A (en) * 1996-03-21 1999-07-13 Walker Asset Management Limited Partnership Method and apparatus for secure document timestamping

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1991013517A1 (en) * 1990-02-21 1991-09-05 Kudelski S.A. Fabrique D'enregistreurs Nagra Video signal scrambling and unscrambling device
EP0666694A1 (en) * 1994-02-02 1995-08-09 General Instrument Corporation Of Delaware Method and apparatus for controlling access to digital signals
EP0674440A2 (en) * 1994-03-21 1995-09-27 NOKIA TECHNOLOGY GmbH A process for encryption and decryption of a bit stream containing digital information
EP0710025A1 (en) * 1994-10-28 1996-05-01 Sony Corporation Digital signal transmitting methods, digital signal receiving apparatus, and recording media

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6496928B1 (en) 1998-01-07 2002-12-17 Microsoft Corporation System for transmitting subscription information and content to a mobile device
WO1999035801A1 (en) * 1998-01-07 1999-07-15 Microsoft Corporation System for transmitting subscription information and content to a mobile device
US6871048B2 (en) * 1998-04-28 2005-03-22 Sony Corporation Mobil communication apparatus and information providing system using the mobile communication apparatus
US7492897B1 (en) 1998-07-17 2009-02-17 Thomson Licensing Conditional access system for broadcast digital television
WO2000004717A1 (en) * 1998-07-17 2000-01-27 Thomson Licensing S.A. A conditional access system for broadcast digital television
JP2002521878A (en) * 1998-07-17 2002-07-16 トムソン ライセンシング ソシエテ アノニム Conditional access system for broadcast digital television
WO2001011883A1 (en) * 1999-08-10 2001-02-15 Intel Corporation System and method for securely distributing content to groups of receivers
EP1150511A1 (en) * 2000-04-13 2001-10-31 Canon Kabushiki Kaisha Information processing apparatus and method
KR100432107B1 (en) * 2000-04-13 2004-05-17 캐논 가부시끼가이샤 Information processing apparatus and method
US8468101B1 (en) * 2000-05-26 2013-06-18 Sony Corporation Electronic money system and payment accepting apparatus
US8098820B2 (en) 2001-03-14 2012-01-17 Thomson Licensing Conditional access system for broadcast digital television
EP1280350A1 (en) * 2001-07-26 2003-01-29 Irdeto Access B.V. Time validation system
AU2002300190B2 (en) * 2001-07-26 2007-12-13 Irdeto Access B.V. Time Validation System
US7296162B2 (en) 2001-07-26 2007-11-13 Irdeto Access B.V. Time validation system

Also Published As

Publication number Publication date
EP0878096B1 (en) 2003-04-02
JP2000504169A (en) 2000-04-04
US6222924B1 (en) 2001-04-24
DE69720421T2 (en) 2004-01-15
AU1548297A (en) 1997-08-22
FI960418A0 (en) 1996-01-30
FI100563B (en) 1997-12-31
DE69720421D1 (en) 2003-05-08
EP0878096A1 (en) 1998-11-18
FI960418L (en) 1997-07-31

Similar Documents

Publication Publication Date Title
EP0878096B1 (en) Scrambling of digital media objects in connection with transmission and storage
US6240185B1 (en) Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
CN100361529C (en) Method and apparatus for securing control words
EP1062812B1 (en) Streaming media player with continuous control and protection of media content
US7409562B2 (en) Method and apparatus for encrypting media programs for later purchase and viewing
CN1196330C (en) Copy protection system for home networks
JP4491069B2 (en) Time shift limited access
KR20010024179A (en) Method and system for preventing unauthorized playback of broadcasted digital data streams
CN1305310C (en) Device and method for selectively supplying access to a service encrypted using a control word and smart card
US20050005143A1 (en) System and method for the copy-protected and use-protected coding and decoding transmission and storage of electronic audio and visual media
JPH11213553A (en) Contract management device and playback device
KR20050109620A (en) Data decoding apparatus and method, charge information processing apparatus and method, data reproducing apparatus and method, electronic money, electronic use right, and terminal apparatus
EP1166562B1 (en) Digital content delivery system and method
JP2825053B2 (en) Pay broadcast transmission / reception system and pay broadcast receiving decoder
JPH0879234A (en) Data receiving device
Konstantas et al. Commercial dissemination of video over open networks: issues and approaches
JP4542518B2 (en) Content usage control transmission device, content usage control reception device, content usage control system, content usage control transmission program, and content usage control reception program
WO2004034705A1 (en) System for secure distribution, storage and conditional retrieval of multimedia content
Thanos COiN-Video: A Model for the Commercialization of Video Streams Over Open Networks
JP2001346189A (en) Recording system for digital broadcasting and providing method for digital broadcasting

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 1997901648

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 09117221

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 1997901648

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWG Wipo information: grant in national office

Ref document number: 1997901648

Country of ref document: EP

DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)